Advanced Search
Search Results
518 total results found
Metadata
Description The Metadata functionality allows expanding the Soffid objects, their attributes, and their data types. Also, it allows expanding custom objects. By default, there is a list of built-in objects, but it is possible to create new custom objects and...
Custom objects
Description The custom objects are the objects created by the administrator to extend the Soffid underlying data model. This allows you to store additional information that is not natively supported by Soffid. This option allows administrator users to provi...
Attribute translation tables
Definition Soffid provides an easy to use mechanism to translate references or external codes into internal codes. For example, the HHRR application could be using a diferent coding scheme for business units. To deal with this data mismatch, users can extend...
PAM Rules
Definition Soffid allows you to define rules to detect commands executed on a server. When a user launches a command defined on a rule, Soffid will detect it. To use those rules you need to define the PAM policies. For more information, you can visit the PAM...
Installing IAM Console
Guide to install IAM Console using Docker. There is a public docker image at docker hub: https://hub.docker.com/r/soffid/iam-console/ Prerequisites Docker 8GB RAM > 10GB disk space (50GB recomended) Supported database installed Video Tutorial In...
Hosts
Description The host screen lets the administrator manage a static IP address assigned to any host. Dynamic IP addresses are automatically managed by Soffid ESSO. Screen overview Related objects Network Operating systems Custom attributes Basics ...
Accounts
Description An account is the way an user is presented on a target system. There can be user accounts as well as system-purpose accounts. An account belongs to a system and that account can have specific permissions assigned to it. An account must have defi...
Process Search
Description A process is a series of actions, connected by transitions. An action could be either an automatic action or a manual task. Soffid console is concerned about task delegation and workflow management. Any user is able to create new processes or any...
How to install Soffid LDAP?
Installation Prerequisites To install Soffid LDAP, you must install Docker. Despite Docker desktop can be used for testing purposes, Docker container runtime usage is recommended. Installation To start Soffid LDAP, execute: docker volume create ldapconf ...
Agents
Description Soffid agents are the tool that allows the connection between the Soffid console and the target systems. To establish the connection with target systems, Soffid provides a large number of connectors that will be able to set up into the Soffid cons...
Windows Administrator access
How to access? For domain member hosts, ESSO will remove all existing local accounts except for those with a dependand service. So, in order to access with administrator privileges, user must use a domain account with local administrator privilege, or either ...
How to Configure Password Manager?
Step-by-Step 1. To use the Soffid Password Manager, you have to Add your Vault to the Password Manager: 2. Then Soffid will ask you to confirm this action: Note, if you are using Soffid ESSO, the Password Manager will connect automatically 3. Finally, ...
How to use Password Manager?
Actions Add vault to Password Manager The first thing you have to do is to Add the vault to the Password Manager Visit the How to Configure the Password Manager page for more information. Once you have added the vault to the Password Manager, this is ready...
Soffid parameters
Definition Soffid allows you to customize the configuration of some attributes of the Console, Syncserver, connectors and add-ons. There are several types of parameters. Informative parameters, such as the versions of internal components of Soffid. Param...
Information systems
Description Information systems are the systems that Soffid will protect granting and revoking roles. Each role and entry point is bound to an information system. The information system can be created hierarchically. These information systems are managed in ...
Roles
Description Soffid allows you to create roles to specify permissions that can be assigned to a user, a group, or an account. These permissions determine what operations are allowed on a resource. You can use roles to delegate access to users, applications, or...
PAM Policies
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that dictate how privileged access is granted, managed, and audited within an organization. Soffid allows you to define policies, those policies can be made up of sev...
Introduction to Recertification
What is Recertification? The Recertification addon provides the functionality to review access rights to make sure the users have access only to what they need. This process increases security and makes the recertification process auditable and compliant. S...
Groups
Description Groups are a convenient way to apply policies to a collection of users. Groups allow administrator users to specify permission for multiple users in a quick and easy way. Groups are managed in a hierarchical way. A user can belong to a group, and ...
Attribute sharing policies
Description After defining the attributes to publish, it’s required to write a policy that defines which attributes will be allowed to share with each service provider. Soffid allows you to define security rules that apply to any attribute that should be del...